Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,897,254 papers from all fields of science
Search
Sign In
Create Free Account
Hashcat / oclHashcat
Known as:
OclHashcat
Hashcat is the self-proclaimed world’s fastest CPU-based password recovery tool. It is released as free software (it had a proprietary codebase until…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
1Password
Brute-force attack
Brute-force search
Cain and Abel
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Cryptanalysis on the Head and Tail Technique for Hashing Passwords
Michael Angelo D. Brogada
,
Ariel M. Sison
,
Ruji P. Medina
IEEE Conference on Systems, Process and Control
2019
Corpus ID: 215817800
Researchers and experts had developed numerous hash-based password authentication schemes. Inappropriately, most of them are…
Expand
2019
2019
Energy-Efficient RAR3 Password Recovery with Dual-Granularity Data Path Strategy
Qingyuan Ding
,
Zhendong Zhang
,
Shunbin Li
,
Peng Liu
International Symposium on Circuits and Systems
2019
Corpus ID: 155593988
Password recovery tools are used to recover lost passwords and regain access to precious data. Due to the extremely large time…
Expand
2019
2019
Data for: Distributed password cracking with BOINC and hashcat
Radek Hranický
,
O. Ryšavý
,
Lukás Zobal
,
D. Kolář
2019
Corpus ID: 208100370
2018
2018
Probabilistic Passphrase Cracking
L. Gommans
2018
Corpus ID: 46823582
Passphrases are an alternative to passwords that are supposed to be easier to remember for users. For passwords, cracking tools…
Expand
2017
2017
Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing
D. Llewellyn-Jones
,
G. Rymer
2017
Corpus ID: 35803063
David Llewellyn-Jones thanks the European Research Council for funding this research through grant StG 307224 (Pico). Graham…
Expand
2014
2014
The Weaknesses of Passwords and Alternative Authentication Technologies
A. G. Harris
2014
Corpus ID: 64341442
Cyber-crime costs businesses millions in lost revenue. The number of attacks on businesses is increasing every day. Text-based…
Expand
2014
2014
Using detection in depth to counter SCADA-specific advanced persistent threats
Garrett Hayes
2014
Corpus ID: 133929052
...................................................................................................................................... iv Table of Contents ...................................................................................................................... v List of Figures ........................................................................................................................... xi Chapter 1. Introduction ......................................................................................................... 1 1.1 Problem Statement .................................................................................................... 2 1.2 Contribution ................................................................................................................ 3 1.3 Thesis Organization .................................................................................................. 4 Chapter 2. Background .......................................................................................................... 6 2.1 Origins of SCADA ........................................................................................................ 7 2.2 SCADA Architecture ................................................................................................... 8 2.2.1 Control Center ................................................................................................................................... 8 2.2.2 Operator Interface ........................................................................................................................ 10 2.2.3 Field Devices ................................................................................................................................... 10 2.3 Wide-‐Area SCADA Networks ............................................................................... 11 2.3.1 Wired Communications .............................................................................................................. 11 2.3.2 Wireless Communications ......................................................................................................... 11 2.4 Common SCADA Communication Protocols ................................................... 12 2.4.1 Modbus Protocol ............................................................................................................................ 12 2.4.2 DNP3 Protocol ................................................................................................................................ 13 2.5 SCADA Convergence ............................................................................................... 14 Chapter 3. SCADA and Security ........................................................................................ 16 3.1 Current State of SCADA Security ........................................................................ 16 3.1.1 The Importance of SCADA Security ....................................................................................... 17 3.1.2 SCADA Security Incidents .......................................................................................................... 18 3.1.3 SCADA Security Standards ........................................................................................................ 19 3.1.3.1 NIST System Protection Profile .......................................................................... 20 3.1.3.2 ISA-‐SP99 ....................................................................................................................... 20 3.1.3.3 AGA-‐12 Documents .................................................................................................. 20
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required